{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:59Z","timestamp":1725483719825},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_27","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"369-383","source":"Crossref","is-referenced-by-count":160,"title":["Hiding Association Rules by Using Confidence and Support"],"prefix":"10.1007","author":[{"given":"Elena","family":"Dasseni","sequence":"first","affiliation":[]},{"given":"Vassilios S.","family":"Verykios","sequence":"additional","affiliation":[]},{"given":"Ahmed K.","family":"Elmagarmid","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"unstructured":"Agrawal, R., Mannila, H., Srinkant, R., Toivonen, H., Verkamo, A. I.: Fast Discovery of Association Rules. In: Fayyad, U., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R. (eds.): Advances in Knowledge Discovery and Data Mining. AAAI Press\/MIT Press (1996) 307\u2013328","key":"27_CR1"},{"unstructured":"Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From Data Mining to Knowledge Discovery: An Overview. In: Fayyad, U., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R. (eds.): Advances in Knowledge Discovery and Data Mining. AAAI Press\/MIT Press (1996) 1\u201334","key":"27_CR2"},{"key":"27_CR3","series-title":"LCNS","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/10719724_28","volume-title":"Proceedings of the Information Hiding Workshop","author":"I. S. Moskowitz","year":"2000","unstructured":"Moskowitz, I. S., Chang, L. A.: An Entropy-Based Framework for Database Inference. In: Proceedings of the Information Hiding Workshop, Dresden, Germany. Springer-Verlag, LCNS 1768 (2000) 405\u2013418"},{"key":"27_CR4","first-page":"507","volume-title":"Knowledge Discovery in Databases","author":"D. E. Leary O\u2019","year":"1991","unstructured":"O\u2019Leary, D. E.: Knowledge Discovery as a Threat to Database Security. In: Piatetsky-Shapiro, G., and Frawley, W. J. (eds): Knowledge Discovery in Databases. AAAI Press\/MIT Press, Menlo Park, CA (1991) 507\u2013516"},{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in Large Databases. In: Proceedings of the ACM-SIGMOD Conference on Management of Data. Washington, DC (1993) 207\u2013216","key":"27_CR5","DOI":"10.1145\/170035.170072"},{"unstructured":"Agrawal, R., Srikant, R.: Fast Algorithm for Mining Association Rules. In: Bocca, J., Jarke, M., Zaniolo, C. (eds.): Proceedings of the Twentieth International Conference on Very Large Data Bases (VLDB 94). Santiago, Chile (1994) 487\u2013499","key":"27_CR6"},{"unstructured":"Clifton, C., Marks, D.: Security and Privacy Implication of Data Mining. In: Proceedings of the 1996 ACM Workshop on Data Mining and Knowledge Discovery (1996)","key":"27_CR7"},{"unstructured":"Clifton, C.: Protecting against Data Mining through Samples. In: Proceedings of the 13th IFIP WG11.3 Conference on Database Security. Seattle, Washington (1999)","key":"27_CR8"},{"unstructured":"Johnsten. T., Raghavan, V.: Impact of Decision-Region Based Classification Mining Algorithms on Database Security. In: Proceedings of the 13th IFIP WG11.3 Conference on Database Security. Seattle, Washington (1999)","key":"27_CR9"},{"unstructured":"Atallah, M., Bertino, E., Elmagarmid, A. K., Ibrahim, M., Verykios, V. S.: Disclosure Limitation Of Sensitive Rules. In: 1999 IEEE Workshop on Knowledge and Data Engineering Exchange. Chicago, Illinois (1999) 45\u201352","key":"27_CR10"},{"unstructured":"Agrawal, R.: Data Mining: Crossing The Chasm. In: Proceedings of the 5th International Conference on Knowledge Discovery in Databases and Data Mining. San Diego, California August (1999)","key":"27_CR11"},{"volume-title":"Technical Report","year":"2000","author":"R. Agrawal","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. Technical Report, IBM Almaden Research Center, San Jose, California (2000)","key":"27_CR12"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T14:50:09Z","timestamp":1550328609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}